首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
物联网的出现,文章认为,加快了社会信息化建设的步伐,为人们创造了便捷、高效、智能化的生活条件,同时也增加了暴露这些隐私信息的危险。研究物联网带来的隐私信息安全问题,对于加速物联网的发展和应用具有积极的意义。  相似文献   

2.
In this study interviews were used to discover the effect of four variables on police image: race, sex, age, and type of communication with policemen. It was found that white subjects, subjects who reported that their images of police were based on personal contact, and subjects who reported no arrest record had significantly more favorable images of police than did their counterparts.  相似文献   

3.
4.
Consumer Acceptance of RFID Technology: An Exploratory Study   总被引:1,自引:0,他引:1  
Radio frequency identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigates the factors that affect consumer acceptance of RFID technology. The purpose of this effort is to develop and test a theoretical model that contextualizes the technology acceptance model (TAM) within the context of RFID technology. The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumerspsila acceptance of RFID. However, the results show that convenience, culture, and security are significant predictors. This study is the first in the RFID literature to use the TAM for explaining consumer acceptance of RFID technology. The findings suggest that: (1) higher perceived convenience of RFID technology leads to greater acceptance of this technology; (2) societal beliefs, value systems, norms, and/or behaviors influence the extent of consumer acceptance of RFID technology; and (3) higher perceived importance of and less willingness to sacrifice personal information security lead to lower intention to use RFID technology. Contextualization of TAM to RFID technology makes this study relevant to practitioners because the results can provide insight to organizations using or exploring the use of RFID technology.  相似文献   

5.
《信息通信技术》2016,(6):11-16
为帮助电信运营商更合理的利用用户信息资源、有的放矢的保护用户隐私,文章借鉴风险容忍度的理论研究提出网络隐私泄露容忍度的概念,并采用调查问卷法对网络隐私泄露容忍度进行了测量。依据测量结果与文章对国内外网络隐私保护举措和现状的梳理归纳,为电信运营商构建安全、高效的信息管理体系提供了实践建议。电信运营商应充分了解用户的网络隐私泄露容忍底线,适当、合理的进行数据挖掘,同时采取企业自律、多重安全技术手段、广泛的用户宣导等多种措施来严守用户的隐私安全。  相似文献   

6.
7.
E-business success factors are Important for traditional enterprises to implement e-business. This topic is attracting more and more researchers to study. This paper makes an exploratory study on the factors influencing e-business success. Firstly, based on the literature review, 52 factors are suggested. Secondly, two rounds of survey with Delphi method are conducted. Qualitative and quantitative analysis are used to identify 57 factors. This is the foundation of empirical study.  相似文献   

8.
互联网时代新职位首席隐私官   总被引:1,自引:0,他引:1  
包括Excite@Home公司、Providian金融公司和AT&T公司在内的几十家美国企业,最近都设立了一种新的管理职位--首席隐私官(CPO),专门负责处理同用户隐私权相关事宜,CPO直接对企业的最高领导人负责。  相似文献   

9.
基于多智能体的网络信息系统的原理与实现   总被引:2,自引:0,他引:2  
本文针对目前单Agent系统的一些缺点,提出采用多Agent技术实现搜索引擎的功能.系统具有计算效率高、可靠性强、可扩充性好、强健壮性、软件可复用性好的优点.并对系统要解决的主要问题:MAS的组织和结构、精确的形式化、通讯、协作问题,进行了详细说明.  相似文献   

10.
Privacy and authentication: An introduction to cryptography   总被引:8,自引:0,他引:8  
This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature.  相似文献   

11.
近年来,随着智能终端在全球市场的成功推出,移动互联网的普及与应用得到了快速发展,并已成为日常生活中的重要组成部分,个人隐私泄露与保护问题也日益凸显。因此,亟需建立以身份管理为核心的信息网络基础设施,用于规范个人信息管理、提升政府的监管能力、促进ICT网络的融合与发展。本文从移动互联网面临的用户隐私信息保护问题入手,介绍了移动互联网中身份管理产业推进的情况,提出了身份管理作为信息网络重要基础设施的应对建议以及下一步的研究建议。  相似文献   

12.
当前法学教育对学生驾驭法律信息资源能力培养在不同程度上缺失,学生使用的检索方法单一,弊端显明。随着现代信息技术的飞速发展,掌握利用计算机网络获取法律信息资源的方法已经成为提升学生法律职业能力的重要手段和途径。  相似文献   

13.
This paper explores the factors influencing perceptions of data warehousing process maturity. Data warehousing, like software development, is a process, which can be expressed in terms of components such as artifacts and workflows. In software engineering, the Capability Maturity Model (CMM) was developed to define different levels of software process maturity. We draw upon the concepts underlying CMM to define different maturity levels for a data warehousing process (DWP). Based on the literature in software development and maturity, we identify a set of features for characterizing the levels of data warehousing process maturity and conduct an exploratory field study to empirically examine if those indeed are factors influencing perceptions of maturity. Our focus in this paper is on managerial perceptions of DWP. The results of this exploratory study indicate that several factors—data quality, alignment of architecture, change management, organizational readiness, and data warehouse size—have an impact on DWP maturity, as perceived by IT professionals. From a practical standpoint, the results provide useful pointers, both managerial and technological, to organizations aspiring to elevate their data warehousing processes to more mature levels. This paper also opens up several areas for future research, including instrument development for assessing DWP maturity.  相似文献   

14.
Web浏览器本地隐私信息通常包含用户保存的各类网站的用户名密码信息,通过一些恶意技术可以窃取用户计算机里所包含的各类用户名密码信息。由于浏览器本身认为系统用户是可信的,因此容易导致用户的用户名密码信息遭到窃取,并且难以防范。首先着重讲解了Web浏览器用户名密码等隐私信息存储方式,接着对获取敏感信息的常用方法做了工程上的实现,最后提出了几种保护浏览器敏感信息的思路和改进方法。  相似文献   

15.
通过对典型局房进行分项计量,建立科学的能耗预算模型,实现对全网能耗的预算,对运营商能耗问题的发现以及节能效果后评估有着重要作用。  相似文献   

16.
信息安全保密的严峻态势和对策   总被引:1,自引:2,他引:1  
要想准确分析目前信息安全保密的态势,就需要对国际上的信息安全动态进行深入的分析.以美国为例,奥巴马就职后,2009年5月决定成立网络战争司令部,2010年5月网络战争司令部正式起动,增补了3000多名网络特种部队、上万名网军.网络战争司令部的使命就是态势感知、系统威胁和网络交战.  相似文献   

17.
The U.S. legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline. Unfortunately, the policies are not easy to comprehend, and, as a result, online consumers frequently do not read the policies provided at healthcare Web sites. Because these policies are often required by law, they should be clear so that consumers are likely to read them and to ensure that consumers can comprehend these policies. This, in turn, may increase consumer trust and encourage consumers to feel more comfortable when interacting with online organizations. In this paper, we present results of an empirical study, involving 993 Internet users, which compared various ways to present privacy policy information to online consumers. Our findings suggest that users perceive typical, paragraph-form policies to be more secure than other forms of policy representation, yet user comprehension of such paragraph-form policies is poor as compared to other policy representations. The results of this study can help managers create more trustworthy policies, aid compliance officers in detecting deceptive organizations, and serve legislative bodies by providing tangible evidence as to the ineffectiveness of current privacy policies.   相似文献   

18.
随着Internet和Intranet的发展,越来越多的信息服务器被广泛使用,如何方便有效地管理这些信息服务器也变得非常迫切。本文在一般的网络管理系统和SNMP协议的基础上提出了一种共享SNMPAGENT的模式,与网络管理系统相结合,可以集成地管理不同的信息服务器。  相似文献   

19.
张有材 《世界电信》1995,8(3):11-13
自美国提出“信息高速公路”的构想之后,Internet的发展格外引人注目。近年来Internet发展更为迅速,并从非赢利性的专用计算机网全面走向商用。此外美国另一个大型信息网正在崛起,与Internet一起共同成为实现“信息高速公路”的基础。  相似文献   

20.
随着中国信息化建设的快速推进与发展,涉密信息越来越多地以电子文档形式呈现在计算机、移动存储介质等电子载体中。对电子文档的违规操作,文档一旦被删除、格式化,或重新安装操作系统,将很难追查。保密检查工作面临着重大难题。而计算机取证技术的引入及发展和应用,解决了这些难题,大大提升了保密检查工作的有效性和威慑力。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号